Sunday, May 3, 2015

Team 6 Cybersecurity Education Homework



Intro

Cybersecurity is a dynamic and developing field within computer science.  The need for cybersecurity has become increasingly clear in the public eye, as a growing number of companies, federal agencies, and individuals have become victims of cyber-attacks.  According to a study performed by the Association of Financial Professionals, “more than 60 percent of companies have been the victim of an attempted cyber-attack” (Pruitt).  This often results in personal information, including credit card numbers, being distributed among criminals.  The hacking of personal photos and information from celebrities and others has featured prominently in the news over the last few years, as well. 

As these attacks multiply in number and severity, there has been a rallying cry to recruit more cybersecurity professionals to battle them.  Postings for cybersecurity jobs have risen by 74 percent over the last five years, and the demand for such jobs is expected to grow by 53 percent through 2018.  Sadly, the call to arms seems to have been left mostly unanswered.  As of 2015, more than 209,000 cybersecurity jobs in the U.S. remain unfilled (Setalvad), and the infrastructure that should be pumping out qualified cybersecurity professionals left and right is struggling to even meet the minimum requirement.  So considering that “the demand for cybersecurity professionals over the past five years grew 3.5 times faster than demand for other IT jobs and about 12 times faster than for all other jobs,” (Setalvad) why is this need not being met?

The answer is complex, and numerous people and organizations are taking steps to encourage students to pursue a career in cybersecurity.  But a strong defense against cyber-attacks is not complete without an educated public.  Even with a team of qualified cybersecurity specialists on retainer, a large corporation can have its information compromised simply by one employee clicking on a malicious link in an email.  With this in mind, other organizations are attempting to bridge the general public’s gap in knowledge when it comes to understanding and implementing basic internet security principles.

The bottom line is that there are currently many gaps in our country’s cybersecurity education program, and this blog is meant to inform you on what they are, and what others have been trying to do about them.


The gender gap


In the big picture, one of the most glaring gaps, not just in cybersecurity education, but in the IT field in general, is that of the under-representation of women.  Google and Facebook have been under scrutiny after it was reported that less than 40 percent of their workforces were women.  Data from the federal Department of Education demonstrates that in 1983-84, computer science degrees accounted for 2.4 percent of all bachelor’s degrees conferred to women, but by 2011-12, that had shrunk to less than 1 percent (Setalvad). 

What’s curious is that this trend towards fewer women in computer science runs counter to the trend in other scientific fields.  So why the divergence from the norm?  Setalvad cites some cybersecurity educators in California as saying that they believe this trend is representative of two things: a lack of encouragement for female students, and the prominence of a negative stereotype about computer enthusiasts. 

One teacher named Phillip Ye put it this way: “Computer science isn’t glamorous…  Popular culture always portrays [cyber-professionals] as nerdy males who live in their mom’s basement, drinking Mountain Dew out of the bottle with chips all around them.  So girls have already developed this resistance to it” (Setalvad).  Nina Levine, another teacher, observes that at a younger age, students from both genders are equally interested in technology studies.  She points out that as they get older, male students tend to stay interested, whereas female students lose interest if they are not encouraged to maintain it.  (Setalvad).

In the computer science industry in general, women account for only about 25 percent of the workforce.  For cybersecurity, that percentage drops to only 10 to 15 percent (Setalvad).  Bringing that percentage higher could make a huge difference in meeting the demand for more cyber-security specialists.


K-12


For students:


In the landscape of K-12 education, students often have “a limited knowledge of cyber-security”, and sometimes (especially at middle school and below) even lack basic computer skills and understanding (Konak).  In general, computer science is an under-taught subject in K-12 classrooms in the U.S.  According to a survey cited by Setalvad, “only 12% of high school students even took a computer science course this last year.”  High school faculty often overlook cybersecurity education in order to favor established programming or robotics courses. 

According to a survey conducted by Raytheon, “41 percent [of high school students] said that during high school, at least one teacher, guidance or career counselor, or other adult in an after-school program or extra-curricular activity discussed or mentioned the idea of a career in cybersecurity.”  This number is up from the previous year when only 18 percent reported similar discussions.  It’s clear from these numbers that there has been some improvement in the discussing of cyber-security principles in general.  Sadly, the survey also reported that 64 percent of the students surveyed were not even offered computer classes as part of their school’s curriculum.  This illustrates the gap in resources for K-12 students who could potentially pursue education in cybersecurity.

To try to fill this gap, different organizations have tried to promote cybersecurity through extracurricular activities and workshops.  Konak and Setalvad give examples of workshops aimed at middle school students that focus on cyphering and basic security principles (for instance, password security).  The workshops use fun, engaging activities at an appropriate level of understanding to excite interest in cybersecurity.  Many of these types of workshops are run by groups of college students, and are meant as an outreach to the community.

Watch the following video clip about a middle school outreach program:

CyberWatch West is another organization trying to fill this gap.  As a program of the National Science Foundation, CyberWatch West aims to promote cybersecurity education in K-12 and colleges throughout the country through the use of hacking competitions, events, and presentations.  The goal of the program is to grow interest in cybersecurity at an earlier education level with the hopes that it will result in more cybersecurity professionals.

While these examples do demonstrate a growing effort to inform K-12 students about cybersecurity options, there is still a long way to go in implementing cybersecurity as a part of regular curriculums.

For educators:


Another gap, as it relates to K-12 education, is the need for qualified instructors to teach cybersecurity.  As with any other subject, teachers require accreditation in order to be able to effectively teach a given subject.  Cybersecurity is no different; however, accreditation requires the teachers to be taught, and that costs money.  There is also some debate on what should be included in cybersecurity accreditation since the field of cybersecurity is a “dynamic, fluid environment” (Conklin).

At present, cybersecurity education for teachers in the U.S. does not include accreditation.  What little education teachers normally have comes from sources like the The National Cyber Security Alliance (NCSA).  The NCSA has recently launched a new website and guidebook aimed at teachers and parents to educate them on safe online practices, so that they can in turn educate their students or children on those principles (“Teach Teenagers”).  Educators are advised to teach students three key safety lessons:  protect privacy, minimize negative publicity, and do not talk to strangers.  The question remains, do these limited resources and online guides provide teachers with enough information to be qualified in sharing these same principles with their students?  Or is there a need for legitimate accreditation?

Currently, there appears to be a growing trend toward increasing the cybersecurity knowledge base for teachers at the high school level.  The National Science Foundation recently gave a grant to a University of New Orleans professor in order to enable him to educate 20 high school teachers on the basics of cybersecurity (“Cyber-Security Training”).  The program is free-of-charge to the teachers, and includes lodging, travel, and meals.  The desired goal of this program is to educate teachers so that they will be more qualified to teach their students.  The expected outcome is that more students will then be exposed to the principles of cybersecurity and have a desire to pursue cybersecurity as a career.  In previous years, the same program was only allowed 15 teachers, so it appears the government is getting more on board with teacher education for cybersecurity, at least in the New Orleans area.

While accreditation is seriously lacking in the U.S., other countries have already began to move in this direction.  In England, a new cybersecurity accreditation program is being launched to enable teachers and schools to meet the increasing need for cybersecurity education in public schools.  Divided into three levels, the new accreditation in “Cyber Awareness” for teachers will also allow schools with a sufficient number of accredited teachers (and fulfill other curriculum-based criteria) to be awarded the “Cyber-Aware Institution” status.  The three-stage accreditation process requires teachers to learn cybersecurity principles, apply them, and then lead others in learning and applying those same principles.  The program is going to be rolled out to five pilot schools around England this month, and will be formally launched in September of 2015 as part of the TechFuture Teachers Programme (“New Cyber Security Accreditation”).

Accreditation for cybersecurity educators, while moving towards a mandatory status in other countries, remains an elusive goal in the United States.  Bridging this gap could make a huge difference in the prolificacy of cybersecurity curriculum in our K-12 classrooms.


College


At the college level, cybersecurity as a topic of study is a little more represented.  Computer Science (CS) majors are often presented opportunities to study cybersecurity as an elective; however, colleges face major challenges in keeping their course offerings relevant for the following reasons:  “the progressive nature of cyber-security and cyber-attacks and keeping curriculum up-to-date, finding qualified instructors, competing resources and topics, lack of proper lab and testing equipment, and dealing with a dynamic curriculum” (Viveros). 

According to Bilzor, there tends to be a trend towards the all-theory approach in college-level cybersecurity courses.  Bilzor contends that a truly relevant curriculum must incorporate a good balance between theory and hands-on experience, noting that theory-heavy courses tend to assume situations that are idealized, and are not completely applicable in the real world.  As Conklin puts it, these theory-driven curriculums tend to assume “predictable, static infrastructure, when the reality is a dynamic, fluid environment” (Conklin).

Workshops on cybersecurity aimed at both CS and non-CS college students offer an interesting perspective on the role cybersecurity should play in the general education curriculum.  Jacobson argues that basic cybersecurity education is important for both major and non-major students in order to produce a better-prepared working class.  The idea is that the principles learned in college will carry over into each student’s professional life, ensuring a higher level of security and safe internet practices in the workplace.

Believing in this same principle (and no doubt feeling the need for more cybersecurity specialists within its own ranks), the federal government currently funds a “Scholarships for Service” program through the National Science Foundation.  The “Scholarships for Service” program gives scholarships to students, regardless of their major, to study cyber-security topics.  The students are then expected to “pay back” their scholarships by working for the federal government in a cyber-security position for a period of time equal to the time during which they received the scholarship (Zacharias).


Organizations


The news has recently been full of stories about the hacking of personal information from companies such as Target, Sony, and Home Depot.  Even the U.S. government has not been exempt from the rising tide of cyber-attacks.  Hackers recently went after the U.S. Postal Service, the State Department, the White House, and the National Oceanic and Atmospheric Administration (NOAA).  According to Benner, “experts have warned for months that corporate hackers are using techniques once reserved for nation-state level warfare and they say an attack on the nation’s largest businesses could disrupt commerce, livelihoods and workers’ morale.”  With all of this hacking going on, the need for a workforce versed in cybersecurity has become apparent.

Kansas City recently conducted a fake phishing attack on its own city employees.  Each employee was sent an email with fake malicious links that asked the employee to reset their password and give personal information.  280 employees gave away their personal information and login credentials during the “attack”, demonstrating the need for improved cybersecurity awareness in the workforce (Davis).  Were this a real attack, hackers would have been enabled to collect and manipulate information in the municipal computer systems.  The sheer number of people who fell for this phishing test is no doubt representative of a greater problem in both the private and government sectors.

Watch the following video clip about cybersecurity in corporations and the accreditation process:
https://www.youtube.com/watch?v=nR-yV0oNaH8

There are many advocates arguing for a national strategy to develop a cybersecurity workforce that is both competent and large enough to handle the ever-evolving threat of cyber-attacks.  Published in 2009, Obama’s Cyberspace Policy Review  says the following:

“Existing cybersecurity training and personnel development programs, while good, are limited in focus and lack unity of effort.  In order to effectively ensure our continued technical advantage and future cybersecurity, we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline for future employees” (McGettrick).

Since 2009, the number of workshops at the corporate and government level has increased in order to develop such a workforce (McGettrick).


Senior citizens


As the number of cyber-attacks rises, senior citizens have increasingly found themselves the targets of such attacks.  According to a study by Cook, et. al., “elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension”.  Cook argues that because elderly computer users are more likely to accept initial information at face value, they are more likely to be taken advantage of with cyber-attacks or online scams.  As Lobo illustrates, “senior citizens have become easy targets for cybercriminals given their trusting nature and poor understanding on how voice and data services work.  Cybercriminals and Spammers target these four types of communication channels (voice, instant messaging, SMS and internet telephone) to defraud senior citizens.”

As of this writing, there are no major initiatives with a specific focus on educating senior citizens on the basics of cybersecurity.


Conclusion


To conclude, there are many gaps in the long-term cybersecurity education plan in the United States.

The government has instituted the National Initiative for Cybersecurity Education (NICE) in an attempt to begin to fill these gaps.  The three main focuses of NICE are education, workforce development, and awareness.  The education component, working with the National Science Foundation and the U.S. Department of Education, plans to enhance education for all citizens in kindergarten through 12th grade, higher education, and vocational programs.  The workforce development component offers tools and resources for people pursuing or already working in a cybersecurity career.  The cybersecurity awareness component is a public awareness campaign.

Stop.Think.Connect” is a national public awareness campaign initiated in 2010, and comprises the awareness arm of NICE. Its main goal is to increase understanding of cyber-threats and to assist the public in being safer and more secure online. The “Stop.Think.Connect” website contains numerous resources including information for parents, games and activities for kids, materials for students in K-12, and more information from research to blogs for young professionals, business people, and older Americans (“Stop.Think.Connect”).

While these programs are a good start, there is still much more to be done to fill the gaps in our nation’s cybersecurity education program.  This blog has given you a look into the present state of things, and our group hopes you will begin to think about how some of these gaps might be better filled.


Works Cited


Benner, Katie. “Is Corporate America Ready for Real Cyber-Security?” The News Tribune. N.p., n.d. Web. 17 Apr. 2015.

Bilzor, Michael. "Seeking Balance in Cyber Education." CrossTalk Online. CrossTalk: The Journal of Defense Software Engineering, 4 Jan. 2015. Web. 15 Apr. 2015.

Conklin, W.A., R.E. Cline, and T. Roosa. “Re-Engineering Cybersecurity Education in the US: An Analysis of the Critical Factors.” 2014 47th Hawaii International Conference on System Sciences (HICSS). N.p., 2014. 2006–2014. Web.

Cook, David, et. al. “Securing the Elderly: A Developmental Approach to Hypermedia Based Online Information Security for Senior Novice Computer Users.” N.p., n.d. Web. 19 Apr. 2015.

"Cybersecurity Training for High School Teachers Will Be Offered in New Orleans." The Times/Picayune Greater New Orleans Blog. The Times/Picayune Greater New Orleans, 31 Mar. 2015. Web. 15 Apr. 2015.

Davis, Mark. "280 Kansas City Employees Fall for Fake Hack." Kansas City Star. Kansas City Star, 26 Mar. 2015. Web. 28 Apr. 2015.

Jacobson, Doug, Julie Rursch, and Joseph Idziorek. "Workshop: Teaching Computer Security Literacy to the Masses: A Practical Approach." IEEE Xplore. Iowa State University, 2012. Web. 15 Apr. 2015.

Konak, Abdullah. "A Cyber Security Discovery Program: Hands-on Cryptography." IEEE Xplore. Penn State Berks, 2014. Web. 15 Apr. 2015.

Lobo, Lucius. “Cyber Scams That Target Senior Citizens in India.” Security Bloggers Network. N.p., n.d. Web. 19 Apr. 2015.

McGettrick, Andrew. "Report of a Workshop on Cybersecurity Education and Training." (n.d.): n. pag. Acm, 30 Aug. 2013. Web. 19 Apr. 2015.

"National Initiative For Cybersecurity Education (NICE)." The National Initiative for Cybersecurity Education (NICE). N.p., n.d. Web. 19 Apr. 2015.

“New Cyber Security Accreditation for Teachers and Schools.” N.p., n.d. Web. 19 Apr. 2015.

Pruitt, Gina. “Reduce the Risk of Cyber-Security Threats with Education and Training.”Nashville Business Journal. N.p., n.d. Web. 17 Apr. 2015.

Raytheon-NCSA. Preparing Millennials to Lead in Cyberspace October 2014 (2015): n. pag. Raytheon.com. Raytheon-NCSA, Oct. 2015. Web. 18 Apr. 2015.

Setalvad, Ariha. "Demand to Fill Cybersecurity Jobs Booming." Peninsula Press. Stanford Journalism Program, 31 Mar. 2015. Web. 16 Apr. 2015.

"Stop.Think.Connect." Homeland Security. N.p., n.d. Web. 18 Apr. 2015.

“Teach Teenagers Cyber-Safety.” Inside School Safety (LRP Publications) 11.4 (2006): 2–2. Print.

Viveros, Marisa, and David Jarvis. "Cybersecurity Education for the next Generation." IBM. IBM Center for Applied Insights, 25 Apr. 2013. Web. 16 Apr. 2015.

Zacharias, Maria C. "Cybersecurity: It's about Way More than Countering Hackers." Nsf.gov. National Science Foundation, 30 Oct. 2014. Web. 16 Apr. 2015.

Friday, June 7, 2013

Fair Use - Flexible Fair Use for Technology in Australia (Team 6)

Just recent, June 5th, the Australian Law Reform Commission (ALRC) posted a paper outlining changes to Australian copyright law that would replace the existing “copyright exceptions” section with a broader, more flexible, American-style Fair Use clause (zdnet article). Seeing as right now the number of countries with a Fair Use policy can be counted on one hand (Wikipedia Fair Use) this could be a good step forward for other nations.

The ALRC proposal includes several different categories for Fair Use to be judged on: “Research or study; criticism or review; parody or satire; reporting news; non-consumptive (such as caching); private and domestic; quotation; education; and public administration.” Under their current laws, cable providers offering the ability to watch any show streamed from the cloud to your television is technically against the copyright of the show holders. This new Fair Use policy would allow Australian law to better reflect the technological world we live in.

And if that wasn’t promising enough, the ALRC is taking in Australian citizens opinions in account before they make their final proposal to the rest of the government. Hopefully this law reform will go through and we can move towards a future with more friendly copyright systems for all nations.

Wednesday, June 5, 2013

Questionable, Ridiculous, and Just Plain Silly EULAs

Following up on my previous post describing what a EULA is and how they work, let's look at some EULAs of some more well-known pieces of software or hardware that you may be using. Some of the terms and conditions of the EULA will surprise you.

I waive my moral rights to EA
Here's another EULA from EA. Basically, EA owns whatever you create and produce on the software. You also waive your moral rights to EA. Also note both the license grant and waiver is still in effect even if you terminate the EULA.

Sony, EA, Steam – No Class Action Lawsuits
The latest revisions of the EULA for the Sony, Electronic Arts, Steam, Microsoft, and a multitude of other prominent software vendors now contain a clause that specifically prohibits the user from engaging in class action lawsuits. Below is an excerpt from the Sony EULA that users must accept to use a PlayStation console.
ANY DISPUTE RESOLUTION PROCEEDINGS, WHETHER IN ARBITRATION OR COURT, WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS OR REPRESENTATIVE ACTION OR AS A NAMED OR UNNAMED MEMBER IN A CLASS, CONSOLIDATED, REPRESENTATIVE OR PRIVATE ATTORNEY GENERAL LEGAL ACTION.

These clauses typically mean if you have any grievances against the company, you give up the right to a lawsuit and must go through an arbitration process that is outside of the courtroom. Unfortunately arbitration payouts are usually much smaller and the playing field is unbalanced towards large companies who have well compensated lawyers.

What do you mean I can't use iTunes to create nuclear weapons?
The iTunes EULA below pretty much explains itself. Guess my evil plan to take over the world has been thwarted.

Read the EULA, get a prize
Since everyone knows that people don’t read EULAs, one software manufacturer actually included a statement within the EULA that stated that a “Special consideration which may include financial compensation” will be given to users who read the EULA. Someone did eventually claim the $1000 prize, four months later.

Perhaps one way to get people to read EULAs would be to include prizes for reading through the document. Unfortunately, most manufacturers don’t want you to read through EULA since that would mean they would be unable to hide controversial clauses in them.

Read a 57 page EULA to watch Sleeping Beauty
Even kids aren't exempt from reading EULAs. The image below is of a 57 page EULA that appears when you insert the disc for Sleeping Beauty. This is an interesting case since movies traditionally did not have EULAs. However with any Blu Ray discs now containing interactive content and downloadable content, EULAs are cropping up. In this case, the EULA appeared since the disc was trying to update content which meant having to accept the EULA.


After reading through these examples, do you now feel the urge to read through EULAs before clicking Accept? Feel free to comment below if you have any additional examples of EULAs like the ones I posted.


Here is the URL to the blog that I started on Blogger regarding Gender issues in Computer Science
http://www.blogger.com/blogger.g?blogID=3279597936089152609#allposts/src=dashboard

Tuesday, June 4, 2013

Team 11, Post 4, Hacktivism: Anonymous for Victims of Assault and Bullying


Team 11, Post 4, Hacktivism: Anonymous for Victims of Assault and Bullying




Introduction

Recently there have been several instances of the hacktivist group Anonymous focusing their attention on cases involving victims of sexual assault and bullying. Two of the three cases discussed in this post resulted in the victim committing suicide. The first case involves a teenage girl named Amanda Todd, who was victimized by a pedophile, resulting in incessant bullying by classmates and lead to her suicide. The second case concerns Rehtaeh Parsons, a teenage girl was allegedly gang-raped by four boys at a party, also resulting in bullying from her classmates and ended in her suicide. Finally, the third case is of a 16-year-old girl from Ohio, who was drugged and raped by two boys, Trent Mays and Ma'Lik Richmond, in public resulting in videotape and photographs of the repeated assaults.

What does this have to do with hacktivism? At first glance, not much; however, it turns out these cases sparked the interest of Anonymous. The group took it upon themselves to, in some cases, locate the parties responsible for the events that took place and expose evidence to the authorities for justice to be served.

Amanda Todd

Amanda's nightmare began when she was 12-years-old, vulnerable and naïve to an older man online. He convinced her to flash him and then about a year later, tried to blackmail her with the picture he took with his webcam. The man threatened if she did not put on a show for him he would send the picture he took of her to all her friends. She refused him and called his bluff, but he was not bluffing. This led to many years of torment from her classmates, who began calling her a porn star and voted her homecoming queen as a joke. Amanda was the butt of every joke and to this 15-year-old girl, it was the end of the world. Amanda posted a video before she took her life, in an effort to tell her story. (Szalavitz)

Anonymous posted a video in response to this tragic event, claiming they had identified the man who was blackmailing Amanda Todd. Anonymous revealed the name and address of the man on Pastebin.com (Sieczkowski). Apparently, Anonymous did not choose to get involved until nude autopsy photos were leaked online (Sieczkowski). The group sent and email to a Canada's CTV News, stating, “We generally don’t like to deal with police first hand but were compelled to put our skills to good use protecting kids. (Sieczkowski)”

Rehtaeh Parsons: #OpJustice4Rehtaeh

Rehtaeh Parsons a 17-year-old girl from Nova Scotia committed suicide on April 7, 2013. Rehtaeh had been mercilessly bullied by school mates following her allegedly being raped by 4 boys at a party. One of the assailants took a picture during the rape and passed it around their school. The photo went viral on social media sites and resulted in her being harrassed, receiving text messages from peers asking her to have sex with them too and calling her names (Harkinson).

The assault transpired 2 years prior to her suicide and resulted in her going from a straight A student to a high school drop out, due to depression and anxiety (Harkinson). Rehtaeh's case for the assault was dropped by authorities due to a lack of evidence.

Following Rehtaeh's suicide, Anonymous stepped in to do some digging of their own. They claimed to have identified the rapists in 2 hours, using the photo that was taken during the assault (Harkinson). Anonymous threatened to release the names to the public if the police department did not reopen the case and get Rehtaeh's family justice, claiming that if they could uncover this much information in a couple of hours, surely they could find more if they tried (Harkinson). However, Rehtaeh's family asked Anonymous not to release their names, worrying for their safety, stating their daughter would not want that (CBC). Anonymous agreed to respect their wishes but warned that others were interested in justice too, and may not keep the boys identities secret.

The Friday following her death and two days after the video announcing their demands for the reopening of Rehtaeh's case, the police department did just that. The PD claims that the reopening had nothing to do with the information obtained from Anonymous (Bogart). Maybe the evidence did not come from Anonymous that sparked the investigation, but it is a fair assessment that their interest and public outcry for justice got things moving again.

Steubenville, OH Rape Case #OpRollRedRoll

Two members of the Steubenville High School football team, found a extremely intoxicated 15-year-old girl at a party and decided to carry her around from party to party, urinating on her and raping her repeatedly. Many people in the community witnessed this happening to the incoherent girl and instead of reporting it to authorities or stopping the guys, some joined in, taking pictures and laughing and others just did not say anything at all. The following day news spread throughout the small town of Steubenville swiftly. The two main assailants involved were charged with the rape, but Anonymous stepped in because they felt like the town was not taking the crime seriously enough and the authorities were corrupt (Marcotte).

Anonymous involving themselves in this case resulted in national media attention. Everyone heard about the rape of a girl by members of the football team in the sleepy town of Ohio. Without Anonymous, would the case have received the same attention? Probably not. Once Anonymous took this on as something they wanted justice for, things moved pretty quickly. The group hacked into the “rollredroll.com,” the high schools athletics page, posting incriminating tweets and information regarding individuals they believed were assisting in covering up details of this crime. According to Amanda Marcotte's article in Slate Magazine, “Anonymous has been vital in getting out at least some of the evidence of the assault to the media.”

In March, the group posted a video, called ExpectPeace, commending the Sheriff of Steubenville. They initially were not a fan of him, but said that he spoke with them during the demonstrations and protests they conducted in the town and offered them his full support in the cause.

Conclusion

These particular cases are not typical, until recently, of Anonymous, but are definitely in the same realm of their corporate hacktivism operations. The group proclaims they are committed to justice being served and when corrupt agencies attempt to cover up details or take advantage of the 99-percent, they will be there, ready to expose the truth. Anonymous taking interest in this type of crime against humanity, the issues of rape and cyberbullying, has the potential to help stop these things from happening. Unfortunately, the approach is not the best, and has skirted the lines of a violation of privacy for some people that happen to fall under the umbrella of direct or inadvertant involvement in these crimes. Anonymous, also, falsely accused a man for cyber-stalking and blackmailing Amanda Todd. The man was already detained at the time for sexual assault of another minor, so they did not feel to bad about that mistake.

Many call them vigilante's, they do not agree with that label. A representative of the group said, “We do not approve of vigilante justice as the media claims. That would mean we approve of violent actions against these rapists at the hands of an unruly mob. What we want is justice. And That's your job. So do it." (Caufield)


Works Cited

Caulfield, Philip. "Group claiming to be Anonymous threatens to unmask boys accused of raping Canadian girl who died after suicide attempt   - NY Daily News." Daily News America - Breaking national news, video, and photos - Homepage - NY Daily News. N.p., 11 Apr. 2013. Web. 5 June 2013. <http://www.nydailynews.com/news/world/anonymous-threatens-unmask- boys-accused-raping-canadian-girl-article-1.1313547#ixzz2VJnBrHcm>.

CBC News. "'Anonymous' won't release names of Rehtaeh Parsons suspects - Nova Scotia - CBC News." CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV. N.p., 12 Apr. 2013. Web. 5 June 2013.

Harkinson, Josh. "Exclusive: Meet the Woman Who Kicked Off Anonymous' Anti-Rape Operations | Mother Jones." Mother Jones | Smart, Fearless Journalism. N.p., 13 May 2013. Web. 4 June 2013.

Marcotte, Amanda. "Steubenville, Ohio rape: Anonymous gets involved, and the case gets even more complicated.." Politics, Business, Technology, and the Arts - Slate Magazine. N.p., 3 Jan. 2013. Web. 5 June 2013. <http://www.slate.com/blogs/xx_factor/2013/01/03/steubenville_ohio_rape_anonymous_gets_involved_and_the_case_gets_even_more.html>

Red, Christian, and Teri Thompson. "Steubenville rape case: Victim hopes one day to forgive Trent Mays & Ma’Lik Richmond, who were found guilty in rape of 16-year-old by Ohio judge." NYDailyNews.com/U.S. N.p., 17 Mar. 2013. Web. 3 June 2012. <https://www.nydailynews.com/news/national/steubenville-high-school-football-players-found-guilty-rape-16-year-old-judge-article-1.1291087>.

Sieczkowski, Cavan. "Amanda Todd's Alleged Bully Named By Anonymous After Teen's Tragic Suicide." Breaking News and Opinion on The Huffington Post. N.p., 16 Oct. 2012. Web. 4 June 2013.

Szalavitz, Maia. "Amanda Todd's Suicide: Internet and Psychological Toll of Bullying | TIME.com." Health & Family | A healthy balance of the mind, body and spirit | TIME.com. N.p., 16 Oct. 2012. Web. 4 June 2013.

The Future of Offshoring from the U.S. Consumer Standpoint



            Over the course of the quarter we have seen U.S. companies offshore to other countries, other countries offshore to the U.S., as well as strategies states used to attract foreign investment. Phew, so much information! Now it is time to put everything together in terms of where offshoring is headed for the future. A little clue given earlier was that offshoring is no longer restricted to the U.S. approaching developing nations. Some countries are approaching America because companies are beginning to search beyond just costs (Ellis). While costs are crucial to a business remaining lucrative, there are other very important incentives that will automatically cover the cost portion such as global exposure in order to gain investors.
        Another important future trend I see is the popularity of producing within the United States. In addition to avoiding the negative stigma offshoring carries, producing internally is popularizing. While it is more expensive to produce in America, costs are lowering and a greater number of people are willing to pay more knowing that the good was made in the U.S. Additionally, I notice a growing trend in goods being more wholesome. What I mean is that consumers are looking for humane companies that do not test on animals for example, or choose to find more natural foods whose ingredients are easily recognizable, as well as making sure that goods are benefitting the U.S. people, which generally occurs from buying goods manufactured internally.
        I very well could be wrong about all these predictions, but when I observe people’s daily habits in conjunction with the negativity that offshoring receives, it is plausible.
        Offshoring has also had a delayed effect on consumers as whole, but the trends did not catch on until much later when people were expecting their goods to remain intact or functional.  Quality assurance has for the most part been the first thing to go for the sake of cost. Let me ask you, is it worth purchasing 10 cheap shirts that have all ripped apart or 2 more expensive shirts that have remained in tact for over five years? These are the kinds of questions consumers are asking! Having had numerous complaints, refunds, and poor reviews, companies are looking to bring their brand back home due to insufficient quality An example of such a move is Sleek Audio, a provider of high end headphones. This company worked with China for quite some time for the sake of reducing costs. Unfortunately there were so many quality issues that the CEO and his son had to make numerous trips just to alleviate these problems (Koerner 2011). They ended up spending more while on striving to save money. It completely defeats itself!
        I understand that this is just one example and there are probably more companies offshoring than not, however according to a survey distributed between 2010 and 2011 by MFG.com, 19% of participating businesses disclosed that they moved some or all of their company back home (Koerner 2011).
        Lastly, since China is an offshoring hotspot, we are seeing rising trends in China’s wages gradually. Wages are still drastically cheaper than wages in the states, however the numbers are steadily growing, so the justification of cheaper labor may not hold up in a few years.
        In sum, offshoring has its ups and downs, but at the end of the day, it lies in the hands of the consumers. While businessmen can cut costs and produce cheaper, if they hold up, consumers will keep buying that company’s goods. If quality suffers as a result of offshoring, consumers’ willingness to buy decreases. I cannot fully say one party wins or loses, but what I can assure is that there are some serious changes happening in the living standard of the American people, so keep your eyes out for what happens in regards to offshoring!

Works Cited

Monday, June 3, 2013

Reporting Live...Anonymous may have a news site soon!



This just in, Anonymous wants to bring you the latest breaking news! Apparently, Anonymous wants to host a web site in more of a formal reporting-the-news form. They have been working towards this for the past couple of months. The amount of support is pretty impressive and having a news site to report out of would be great. I am however, wondering how long they’ll be able to keep it up before the government starts breathing down their neck, especially if they release stories in which the government considers to be “private” or “sensitive” information. Regardless many people have vocally and monetarily support this idea. Anonymous “raised $54,000 for the purpose of launching a site that would take the group’s nascent newsgathering efforts beyond Twitter and Tumblr” (Gillette).
What’s unknown is why Anonymous doesn’t use or rely on Facebook to gather information or spread their message. “Among other things, the site will aggregate news from various indie news sources. It will also integrate information from Twitter while largely shunning Facebook (FB)” (Gillette). Perhaps Anonymous feels as if Facebook is unreliable. For whatever reason, Anonymous states that they will accumulate data from multiple sources, clearly one of which will not be Facebook, and substantiate these into one steady stream, their news site.
What I like most about the idea of this site is that it will be informative and educational, without various users chiming in and arguing via the comment section. Your Anon News officially stated “there will be no comments section” (Gillette). People will be able to submit stories while the web site will filter out these submissions based on “quality, authenticity, and relevance” (Gillette). I like this because it still gives the common user a place to contribute and be a part of the online Anonymous community while restricting any potential rants and ravings via the comments section.
I’d like to digress for a quick second and give my opinion on the use of a comments section and why I whole-heartedly applaud Anonymous for not putting them into their news site. I often find a lot of the times, that news stories on different websites are interesting and legitimate, only to read the ignorant and obnoxious comments by users. In my mind, I know the hosts of these sites aren’t responsible for these comments, but it still ruins the content of the main articles. On the other hand, and not to completely contradict myself, I understand the comments section gives people access to discuss, ask questions, elaborate, and so on but more often than not the comments don’t add any content to the articles and usually end with some kind of argument which may or may not even be related to the original story in the first place.
Overall, I think the idea of the website sounds wonderful. The goal is to actually report real news that has more of a global and ethical impact. Anonymous wants to report stories such as “Why isn’t CNN-Turk airing footage of [] massive protests” instead of stories about “Kardashian[‘s] [exploding] butt implants” (Gillette). This is a breath of fresh air of real journalism that has more or less begun to elude mainstream in light of more popular, but not necessarily more informational, stories. I can’t wait until Anonymous’ news site is up and running.


Works Cited:

Gillette, Felix. "Anonymous Prepares to Enter the News Business." BusinessWeek, 3 June 2013. Web. 3 June 2013. <http://www.businessweek.com/articles/2013-06-03/anonymous-prepares-to-enter-the-news-business#r=rss>.